Arbitrary Code Injection Affecting composer package, versions <0:2.9.7-1.hum1


Severity

Recommended
0.0
low
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL10-COMPOSER-15968575
  • published10 Apr 2026
  • disclosed30 Dec 2025

Introduced: 30 Dec 2025

CVE-2025-67746  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade RHEL:10 composer to version 0:2.9.7-1.hum1 or higher.
This issue was patched in RHSA-2026:8165.

NVD Description

Note: Versions mentioned in the description apply only to the upstream composer package and not the composer package as distributed by RHEL. See How to fix? for RHEL:10 relevant fixed versions and status.

Composer is a dependency manager for PHP. In versions on the 2.x branch prior to 2.2.26 and 2.9.3, attackers controlling remote sources that Composer downloads from might in some way inject ANSI control characters in the terminal output of various Composer commands, causing mangled output and potentially leading to confusion or DoS of the terminal application. There is no proven exploit and this has thus a low severity but we still publish a CVE as it has potential for abuse, and we want to be on the safe side informing users that they should upgrade. Versions 2.2.26 and 2.9.3 contain a patch for the issue.

CVSS Base Scores

version 3.1